net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()
Summary
| CVE | CVE-2026-43238 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:44 UTC |
| Updated | 2026-05-06 13:07:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()
Commit 38a6f0865796 ("net: sched: support hash selecting tx queue")
added SKBEDIT_F_TXQ_SKBHASH support. The inclusive range size is
computed as:
mapping_mod = queue_mapping_max - queue_mapping + 1;
The range size can be 65536 when the requested range covers all possible
u16 queue IDs (e.g. queue_mapping=0 and queue_mapping_max=U16_MAX).
That value cannot be represented in a u16 and previously wrapped to 0,
so tcf_skbedit_hash() could trigger a divide-by-zero:
queue_mapping += skb_get_hash(skb) % params->mapping_mod;
Compute mapping_mod in a wider type and reject ranges larger than U16_MAX
to prevent params->mapping_mod from becoming 0 and avoid the crash. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 59809fda4da7730cfe84a948033f47eb45db073d git |
Not specified |
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 9c735a7d98c982a786b0db71eb6566ee00aaa04f git |
Not specified |
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 015cebdfcb97b5347fb7f598ea712a281cb35840 git |
Not specified |
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 4ece5eb4836f8ff03b9004dc2430a7169f282851 git |
Not specified |
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 3c2b95b26860bd6f8e2310d31ea1200d3f8f173e git |
Not specified |
| CNA |
Linux |
Linux |
affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f be054cc66f739a9ba615dba9012a07fab8e7dd6f git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.19 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.19 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.165 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.128 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.75 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.16 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.6 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/be054cc66f739a9ba615dba9012a07fab8e7dd6f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3c2b95b26860bd6f8e2310d31ea1200d3f8f173e |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/59809fda4da7730cfe84a948033f47eb45db073d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4ece5eb4836f8ff03b9004dc2430a7169f282851 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/015cebdfcb97b5347fb7f598ea712a281cb35840 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/9c735a7d98c982a786b0db71eb6566ee00aaa04f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.